Commit Graph

733 Commits (18b90f957d24f9573efbb70523ee0c7fa3519190)

Author SHA1 Message Date
Ricardo Maia 820dc8ef72 Exim Detect template 2023-10-04 22:04:30 +00:00
johnk3r f953aca287
Create wsftp-detect.yaml (#8285)
* Create wsftp-detect.yaml

* Update and rename wsftp-detect.yaml to wsftp-ssh-detect.yaml

* Update and rename wsftp-ssh-detect.yaml to ws_ftp-ssh-detect.yaml

* Create ws_ftp-server-web-transfer.yaml

* misc update

* Update ws_ftp-server-web-transfer.yaml

* Update ws_ftp-ssh-detect.yaml

---------

Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
2023-09-30 13:51:24 +05:30
GitHub Action 0b5872b72f TemplateMan Update [Fri Sep 29 09:33:18 UTC 2023] 🤖 2023-09-29 09:33:18 +00:00
sandeep 9fa9792dbf misc fix 2023-09-29 14:51:39 +05:30
Daniel Beneyto e109f59372 Added bgp-detect template 2023-09-29 10:21:46 +02:00
sandeep 66bb9b03df duplicate keys 2023-09-27 23:09:23 +05:30
sandeep f12ba880af Merge remote-tracking branch 'origin' into impact-update 2023-09-27 22:48:05 +05:30
Prince Chaddha 1cd804ad8c Added Impact 2023-09-27 21:21:13 +05:30
GitHub Action 627e654d30 TemplateMan Update [Wed Sep 27 13:29:58 UTC 2023] 🤖 2023-09-27 13:29:59 +00:00
sandeep 29133d5978 removed duplicate network request 2023-09-17 01:05:21 +05:30
Prince Chaddha 1bab419ce5 Updated network CVEs 2023-09-06 18:58:19 +05:30
pentesttoolscom 95da9ded2c
Fix unauth_psql detection on other protocols
If the protocol we send the request to reflects our message we detect it
as a FP. Excluding a 500 error code should be a more general rule.
2023-09-01 12:04:59 +03:00
Neriberto CP a8683c1bb9 Update exposed-redis.yaml
This suggests a CWE classification
2023-08-28 22:39:52 -03:00
pussycat0x 24ce17083b
Fix-FP generic-c2-jarm.yaml 2023-08-22 14:55:05 +05:30
Dhiyaneshwaran 144f255be0
fix marshall error 2023-08-18 10:04:56 +05:30
Dhiyaneshwaran 241e679e09
fix remediation 2023-08-18 08:04:00 +05:30
Dhiyaneshwaran 482da717f2
fix remediation 2023-08-18 08:02:07 +05:30
pussycat0x a262a7361a
lint -fix 2023-08-18 00:03:43 +05:30
pussycat0x c920bfef86 Network Remediation - Update 2023-08-17 23:59:31 +05:30
Dhiyaneshwaran ee0d3a9bdd
Merge pull request #7924 from projectdiscovery/havoc-c2
Havoc C2  - Detection
2023-08-16 09:50:11 +05:30
Dhiyaneshwaran 94344ac938
Merge pull request #7926 from pentesttools-com/fix-apache-rocketmq-broker-unauth
Fix apache-rocketmq-broker-unauth.yaml
2023-08-16 09:46:59 +05:30
pentesttoolscom 289c71c6eb
Fix apache-rocketmq-broker-unauth.yaml 2023-08-14 12:43:41 +03:00
pentesttoolscom a608067c3c
Fix unauth-psql.yaml false positive
Fix unauth-psql.yaml giving false positive results when the request is
reflected in the HTTP/FTP response.
2023-08-14 10:07:02 +03:00
pussycat0x 2c804759f7 Havoc C2 - Detection 2023-08-14 11:33:44 +05:30
Dhiyaneshwaran e834535479
Merge pull request #7865 from pentesttools-com/Fix-RocketMQ-Broker-Unauth
Fix Apache-rocketmq-broker-unauth.yaml
2023-08-09 01:45:13 +05:30
Dhiyaneshwaran 54570db96d
Merge pull request #7867 from pentesttools-com/Fix-psql-detection
Fix pgsql-detect.yaml
2023-08-09 01:44:25 +05:30
Dhiyaneshwaran 52623c2124
Merge pull request #7866 from pentesttools-com/Fix-ibm-d2b-database-server-detection
Fix Ibm-d2b-database-server.yaml
2023-08-09 01:44:09 +05:30
pussycat0x 2fad1e958e
Update apache-rocketmq-broker-unauth.yaml 2023-08-08 22:52:06 +05:30
pussycat0x 1d11e5559d
matcher - update 2023-08-08 22:44:31 +05:30
pussycat0x 1e2502b32b
matchers - update 2023-08-08 22:43:47 +05:30
pussycat0x 1627ddf1c4
Update samba-detect.yaml 2023-08-08 22:42:16 +05:30
pussycat0x 062c36a7fb
Update ibm-d2b-database-server.yaml 2023-08-08 22:41:04 +05:30
pentesttoolscom 4814271ae6
Fix linting 2023-08-08 10:13:14 +03:00
pentesttoolscom 9fc0c3d2e9
Fix linting 2023-08-08 10:11:23 +03:00
pentesttoolscom 8b8399d3c5
Fix template linting 2023-08-08 10:09:37 +03:00
pussycat0x 6e4ccb8bba
Indentation - fix 2023-08-07 21:48:42 +05:30
pentesttoolscom f01d238b6c
Fix samba-detect.yaml 2023-08-07 17:44:10 +03:00
pentesttoolscom 9435cca227
Fix psql-detect.yaml 2023-08-07 17:39:37 +03:00
pentesttoolscom 4861c89ef4
Fix Ibm-d2b-database-server.yaml 2023-08-07 17:34:20 +03:00
pentesttoolscom 7c7d75a55e
Fix apache-rocketmq-broker-unauth.yaml 2023-08-07 17:20:04 +03:00
Dhiyaneshwaran c58525404a
Merge pull request #7791 from malikashish8/fix-fp-rocketmq-unauth
Add negative filter for rocketmq unauth
2023-08-01 10:10:39 +05:30
Prince Chaddha 317a4bcf82 updated tags 2023-07-31 21:09:04 +05:30
sandeep f611d700e7 Added strict matchers instead of using negative matcher 2023-07-31 14:43:27 +05:30
malikashish8 cf13674ca8 add negative filter for rocketmq unauth 2023-07-31 10:46:31 +10:00
GitHub Action c35673f0c4 TemplateMan Update [Fri Jul 28 07:53:40 UTC 2023] 🤖 2023-07-28 07:53:41 +00:00
pussycat0x 8c33100f65
Add files via upload 2023-07-28 12:01:53 +05:30
ErikOwen 67a02bb507 standardize network template tags 2023-07-24 11:27:05 -07:00
GitHub Action cb53e21d50 TemplateMan Update [Tue Jul 18 08:23:15 UTC 2023] 🤖 2023-07-18 08:23:15 +00:00
Dhiyaneshwaran 44e36dec6b fix spacing 2023-07-18 13:47:02 +05:30
pussycat0x 5182daf53b
Merge branch 'main' into jarm-c2-detect 2023-07-18 13:19:58 +05:30
sandeep 3ec9dd7614 network template enrichment 2023-07-16 18:59:08 +05:30
pussycat0x 794a725837
Update apache-rocketmq-broker-unauth.yaml 2023-07-14 23:01:36 +05:30
pussycat0x 197d816040 C2 Jarm - Detect 2023-07-14 13:32:24 +05:30
pussycat0x 65d3634438 remove -jarm 2023-07-14 12:59:04 +05:30
pussycat0x ed01088d6d C2 Jarm - Detect 2023-07-14 12:48:42 +05:30
Dhiyaneshwaran 5088d51edd
error fix 2023-07-10 10:08:10 +05:30
GwanYeong Kim 0e5fcfa57e Updated EPSS Score to CVE Templates
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2023-07-10 09:25:11 +09:00
Prince Chaddha fb087bbc59 Merge branch 'main' into pussycat0x-1 2023-07-07 17:08:23 +05:30
Prince Chaddha 0a681ec0bb removed empty lines 2023-07-07 16:56:27 +05:30
pussycat0x 0ccffd229a
Merge branch 'main' into remove-comments 2023-07-07 16:38:46 +05:30
GitHub Action 8fc95cf110 TemplateMan Update [Fri Jul 7 10:32:26 UTC 2023] 🤖 2023-07-07 10:32:27 +00:00
GitHub Action db7e81da7e TemplateMan Update [Fri Jul 7 10:31:10 UTC 2023] 🤖 2023-07-07 10:31:10 +00:00
Ritik Chaddha fadad887fb
Merge pull request #7408 from j4vaovo/patch-54
Create apache-rocketmq-broker-unauth.yaml
2023-07-07 16:00:35 +05:30
Ritik Chaddha 855f8ea1e7
Merge pull request #7420 from j4vaovo/patch-55
Create apache-dubbo-unauth.yaml
2023-07-07 15:59:26 +05:30
pussycat0x 95a818f0c6
Rename network/apache-dubbo-unauth.yaml to network/misconfig/apache-dubbo-unauth.yaml 2023-07-06 23:14:42 +05:30
pussycat0x b12d7501f3
minor -update 2023-07-06 23:14:03 +05:30
pussycat0x 0d4c01fc20
Rename network/apache-rocketmq-broker-unauth.yaml to network/misconfig/apache-rocketmq-broker-unauth.yaml 2023-07-06 22:23:13 +05:30
pussycat0x 8871b8acd1
protocol & metadata -update 2023-07-06 22:22:31 +05:30
Prince Chaddha 75ed275328 removed enhanced by comments 2023-07-05 13:37:58 +05:30
sandeep 187fab91ee Merge remote-tracking branch 'origin' into pussycat0x-1 2023-07-04 15:42:58 +05:30
Prince Chaddha 50d86c25a1
Merge pull request #7344 from ErikOwen/patch/tag-standardization
Patch: Tag Standardization
2023-07-04 13:10:55 +05:30
pussycat0x 72d144cd52 Network Directory - Restructuring 2023-07-03 12:28:37 +05:30
GitHub Action d9ba084506 TemplateMan Update [Sat Jul 1 13:39:57 UTC 2023] 🤖 2023-07-01 13:39:58 +00:00
Dhiyaneshwaran 3b374adffa
Merge pull request #7564 from projectdiscovery/pussycat0x-patch-6
PostgreSQL - Unauthenticated Access
2023-07-01 19:08:04 +05:30
GitHub Action e9eafd5f7d TemplateMan Update [Sat Jul 1 13:36:56 UTC 2023] 🤖 2023-07-01 13:36:57 +00:00
Dhiyaneshwaran dd68087392
Update unauth-psql.yaml 2023-07-01 19:05:09 +05:30
ErikOwen 3a4b625e3d add detect tag to templates ending with -detect.yaml 2023-06-30 15:56:17 -07:00
ErikOwen 43248088bf add network tag to network/ templates 2023-06-30 15:53:55 -07:00
ErikOwen 7c39bb37e9 Merge remote-tracking branch 'origin/patch/tag-standardization' into patch/tag-standardization 2023-06-30 15:08:03 -07:00
ErikOwen 4e979d1dc5 merge branch main into patch/tag-standardization 2023-06-30 14:56:15 -07:00
pussycat0x 371642ad1a
PostgreSQL - User Enumeration 2023-06-28 18:16:54 +05:30
Dhiyaneshwaran 66607766cc
comment space fix 2023-06-28 10:54:50 +05:30
pussycat0x 7b8f01380d
Update unauth-psql.yaml 2023-06-28 10:32:46 +05:30
pussycat0x fb81d4d0a2
Add files via upload 2023-06-28 10:14:14 +05:30
GitHub Action acfcac3e67 TemplateMan Update [Fri Jun 23 05:22:07 UTC 2023] 🤖 2023-06-23 05:22:08 +00:00
Ritik Chaddha 16dcbe64db
Merge pull request #7326 from projectdiscovery/pussycat0x-patch-6
CVE-2020-1938 minor - update
2023-06-23 10:50:08 +05:30
pussycat0x f98a8c1e56
Update CVE-2020-1938.yaml 2023-06-23 10:27:18 +05:30
GitHub Action 41277637c0 TemplateMan Update [Wed Jun 21 21:03:53 UTC 2023] 🤖 2023-06-21 21:03:54 +00:00
Dhiyaneshwaran 17f9727040
Merge pull request #7444 from j4vaovo/patch-61
Update CVE-2020-11981.yaml
2023-06-16 10:30:13 +05:30
Dhiyaneshwaran f90fab0938
Merge pull request #7443 from j4vaovo/patch-60
Update CVE-2023-33246.yaml
2023-06-16 10:29:00 +05:30
Ritik Chaddha 191365a6c8
Merge pull request #7422 from j4vaovo/patch-56
Update CVE-2022-24706.yaml
2023-06-16 10:26:34 +05:30
Dhiyaneshwaran 3f13ff9e76
Merge pull request #7392 from projectdiscovery/princechaddha-patch-2
Fixing tags
2023-06-16 09:48:34 +05:30
J4vaovo 525917af27
Update tidb-native-password.yaml 2023-06-15 03:26:00 +08:00
J4vaovo c6e9e385d1
Update CVE-2020-11981.yaml 2023-06-15 03:01:51 +08:00
J4vaovo 0c2823fb5b
Update CVE-2023-33246.yaml 2023-06-15 03:00:56 +08:00
pussycat0x 916c498ad1
Merge pull request #7440 from j4vaovo/patch-57
Update CVE-2018-2893.yaml
2023-06-14 23:31:02 +05:30
J4vaovo b6c4907e47
Update CVE-2016-3510.yaml 2023-06-15 01:50:29 +08:00
J4vaovo 62a59e1bcd
Update CVE-2018-2893.yaml 2023-06-15 01:44:49 +08:00
J4vaovo 1f3cb91d40
Update CVE-2022-24706.yaml 2023-06-14 19:40:06 +08:00
J4vaovo 3473c3fc13
Update apache-rocketmq-broker-unauth.yaml 2023-06-14 18:44:15 +08:00
J4vaovo 133c7c5854
Create apache-dubbo-unauth.yaml 2023-06-14 18:39:09 +08:00
J4vaovo 1ee72e0cf8
Update apache-rocketmq-broker-unauth.yaml 2023-06-14 01:25:54 +08:00
J4vaovo 8adf33c65e
Update apache-rocketmq-broker-unauth.yaml 2023-06-14 00:14:49 +08:00
J4vaovo 0cd15711c9
Update apache-rocketmq-broker-unauth.yaml 2023-06-14 00:13:51 +08:00
J4vaovo 445b079614
Create apache-rocketmq-broker-unauth.yaml 2023-06-14 00:10:15 +08:00
Prince Chaddha b86f5b4a3c
Fixed matchers-condition CVE-2020-11981 2023-06-13 14:22:29 +05:30
Prince Chaddha f9fd870fbb misc changes 2023-06-12 18:54:55 +05:30
Ritik Chaddha 25b6a01944
Merge pull request #7340 from projectdiscovery/pussycat0x-patch-14
CVE-2023-33246  -  RocketMQ <= 5.1.0 Remote Code Execution
2023-06-08 23:46:44 +05:30
Ritik Chaddha 13cfd3403b
Update CVE-2023-33246.yaml 2023-06-08 23:37:44 +05:30
sandeep bf7a9bea6c strict + fixed matcher 2023-06-07 17:54:20 +05:30
Dhiyaneshwaran d4c0410724
Update CVE-2022-24706.yaml 2023-06-06 12:47:45 +05:30
Dhiyaneshwaran f6a913e67d
protocol update 2023-06-06 12:43:28 +05:30
Dhiyaneshwaran 1e6a6f6937
Merge pull request #7070 from projectdiscovery/feat-CVE-2022-24706
Adding CVE-2022-24706 (couchdb RCE)
2023-06-06 12:40:24 +05:30
pussycat0x 6d24c721bf
data - update 2023-06-06 12:37:03 +05:30
Dhiyaneshwaran 6b9d2d8791
minor enhancement 2023-06-06 12:12:39 +05:30
Ritik Chaddha 1e1becbe31
lint fix 2023-06-06 09:36:47 +05:30
sandeep ffd3754f68 syntax fixes 2023-06-06 03:45:15 +05:30
ErikOwen 58c473547d add network tag to templates in network/ 2023-06-05 11:07:02 -07:00
pussycat0x 6870afdbaf
condition - update 2023-06-05 19:50:08 +05:30
Dhiyaneshwaran 98d42373cc
added metadata 2023-06-05 17:00:49 +05:30
pussycat0x 96e6a4ef23
Update CVE-2023-33246.yaml 2023-06-05 16:38:24 +05:30
sandeep e53d19f583 boolean format update 2023-06-04 13:43:42 +05:30
GitHub Action df5a969b80 Auto Generated CVE annotations [Sat Jun 3 18:56:35 UTC 2023] 🤖 2023-06-03 18:56:35 +00:00
pussycat0x b10e9e7a8a
Rename cves/2022/CVE-2022-24706.yaml to network/cves/2022/CVE-2022-24706.yaml 2023-06-02 13:14:45 +05:30
Ritik Chaddha 5606478cc2 update max-req=> max-request 2023-06-01 23:08:50 +05:30
Ritik Chaddha bc3dd3c0d4 Revert "update max-req => max-request"
This reverts commit d82143eacc.
2023-06-01 22:48:38 +05:30
Ritik Chaddha d82143eacc update max-req => max-request 2023-06-01 22:46:25 +05:30
sandeep 60331c8e46 lint update 2023-06-01 21:51:22 +05:30
sandeep a9427d2479 misc updates 2023-06-01 21:47:35 +05:30
pussycat0x 65d9266e31
CVE-2023-33246 RocketMQ versions <= 5.1.0 Remote Code Execution 2023-06-01 21:02:58 +05:30
Dhiyaneshwaran 96a1e25e14
Merge pull request #7305 from ruben-condor/add-classification-for-CVE-2020-11981.yaml
Updated CVE-2020-11981
2023-05-31 16:07:25 +05:30
pussycat0x 511a84bd24
Update CVE-2020-1938.yaml 2023-05-31 08:41:37 +05:30
pussycat0x 6b6bfb32aa
CVE-2020-1938 minor - update 2023-05-31 08:34:41 +05:30
Dhiyaneshwaran dd7721e326
Update axigen-mail-server-detect.yaml 2023-05-30 15:34:14 +05:30
Ruben Condor 4721c2fc48
Updated axigen-mail-server-detect.yaml 2023-05-30 12:09:21 +03:00
Ruben Condor a1faf3d103
Updated CVE-2020-11981 2023-05-29 14:32:09 +03:00
Ritik Chaddha c9db123f00
Merge branch 'main' into CVE-2017-5645 2023-05-24 21:44:34 +05:30
Ritik Chaddha ea95e195d3
updated info 2023-05-24 21:42:39 +05:30
pussycat0x 70f90eb489
minor -update 2023-05-24 20:09:45 +05:30
Prince Chaddha 5e478b89c7
Rename teamspeak3-detect to teamspeak3-detect.yaml 2023-05-19 12:17:23 +05:30
Ritik Chaddha d7307f30cb
Merge pull request #7251 from projectdiscovery/princechaddha-patch-5
Create CVE-2016-3510.yaml
2023-05-18 19:51:30 +05:30
Ritik Chaddha 5e6c3691c0
updated info 2023-05-18 19:48:04 +05:30
Dhiyaneshwaran 89ac9e63d6
Merge pull request #7242 from projectdiscovery/pussycat0x-patch-6
CVE-2020-11981
2023-05-18 15:10:00 +05:30
Dhiyaneshwaran d9a02b0c53
added additional matcher 2023-05-18 14:58:30 +05:30
Ritik Chaddha 12b7b57f30
lint fix 2023-05-18 12:00:39 +05:30
Prince Chaddha e93696fa8a
Create CVE-2016-3510.yaml 2023-05-18 11:30:51 +05:30
pussycat0x 5c0e6198cd
minor -update 2023-05-17 18:46:14 +05:30
Dhiyaneshwaran c3db741049
Merge pull request #7220 from ricardojba/patch-1
Update exposed-redis.yaml
2023-05-17 10:43:08 +05:30
pussycat0x c7be82ceee
Update CVE-2020-11981.yaml 2023-05-17 02:03:10 +05:30
Dhiyaneshwaran 24aaa07529
Merge pull request #7222 from ricardojba/patch-3
Update CVE-2022-0543.yaml
2023-05-17 01:37:52 +05:30
Ritik Chaddha e80da2de1e
lint fix 2023-05-16 23:39:07 +05:30
pussycat0x e9465adf12
CVE-2020-11981 2023-05-16 21:59:43 +05:30
Ricardo 46117c8435
Update CVE-2022-0543.yaml
Support TLS enabled Redis
2023-05-11 15:34:05 +01:00
Ricardo 5105ffc5c3
Update redis-detect.yaml
Detect TLS enabled Redis and TLS enabled Azure Cache for Redis
2023-05-11 15:30:15 +01:00
Ricardo fad493fcfb
Update exposed-redis.yaml
Detect TLS enabled Redis and TLS enabled Azure Cache for Redis
2023-05-11 15:27:52 +01:00
Ritik Chaddha 9a7ac7d2bd
Merge pull request #7208 from projectdiscovery/pussycat0x-patch-14
SMTP User Enumeration
2023-05-11 17:02:16 +05:30
Ritik Chaddha c187d4cc2c
Merge pull request #7181 from projectdiscovery/pussycat0x-patch-6
SMTP Commands Enumeration
2023-05-11 16:25:17 +05:30
pussycat0x 18323967e8
Create smtp-user-enum.yaml 2023-05-10 01:22:05 +05:30
pussycat0x 0246c47f00
Delete smtp-user-enum.yaml 2023-05-10 01:17:14 +05:30
pussycat0x 64b021ede2
SMTP User Enumeration 2023-05-10 01:11:48 +05:30
pussycat0x a289dc9ef5
Update smtp-commands-enum.yaml 2023-05-10 00:05:39 +05:30
pussycat0x 983915d4bc
Rename CVE-2020-11547.yaml to CVE-2020-11547.yaml 2023-05-05 19:02:53 +05:30
pussycat0x ed67d0b943
Update smtp-commands-enum.yaml 2023-05-05 18:58:03 +05:30
pussycat0x d17a0c1246
SMTP Commands Enumeration 2023-05-05 18:56:49 +05:30
Ritik Chaddha 561b42ebe7 Merge branch 'main' into add-cpe-epss 2023-05-05 00:00:13 +05:30
sandeep e5ae45127e Merge remote-tracking branch 'origin' into add-cpe-epss 2023-05-02 18:21:24 +05:30
sandeep 1f5b1f2c47 Added max request counter of each template 2023-04-28 13:41:21 +05:30
Prince Chaddha e0af666e1c
Refactoring the directory structure based on protocols (#7137)
* moving http templates

* updated cves.json

* moved network CVEs

* updated scripts

* updated workflows

* updated requests to http

* replaced network to tcp

---------

Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
2023-04-27 09:58:59 +05:30
Dhiyaneshwaran c6718f1499
Update beanstalk-service.yaml 2023-04-21 17:12:11 +05:30
Dhiyaneshwaran 799f713b8c
Update msmq-detect.yaml 2023-04-21 17:11:37 +05:30
pussycat0x bf126b24c8
Protocol update network -> tcp 2023-04-20 02:46:20 +05:30
Ritik Chaddha 5dc6036a9a
Update msmq-detect.yaml 2023-04-20 02:28:15 +05:30
Ritik Chaddha d4b490195d
indentation fix 2023-04-19 23:17:04 +05:30
Brandon Hutchinson e34e263509 Added network/detection/msmq-detect.yaml 2023-04-19 15:34:10 +00:00
pussycat0x a623589fcc
Beanstalk Service - Detect 2023-04-12 17:26:45 +05:30
Prince Chaddha 899029a1aa
updated to host 2023-04-09 08:17:24 +05:30
pussycat0x 40465c769c
minor -update 2023-04-08 22:42:10 +05:30
pussycat0x 5fa705e717
Update kafka-topics-list.yaml 2023-04-05 13:16:13 +05:30
pussycat0x db1f466f51
fix -FP 2023-04-05 10:28:38 +05:30
Ritik Chaddha dec264a418
Merge pull request #7009 from MostInterestingBotInTheWorld/dashboard
Dashboard Content Enhancements
2023-03-31 21:19:24 +05:30
pussycat0x e53386d074
Update kafka-topics-list.yaml 2023-03-30 20:02:42 +05:30
pussycat0x 7ea625bf1f
Kafka Topics List 2023-03-30 17:10:37 +05:30
MostInterestingBotInTheWorld 455f69376f Enhancement: network/detection/rtsp-detect.yaml by md 2023-03-29 15:24:51 -04:00
MostInterestingBotInTheWorld 3e2df9f3cd Enhancement: network/detection/imap-detect.yaml by md 2023-03-29 15:22:47 -04:00
MostInterestingBotInTheWorld c8ed0959c9 Enhancement: network/detection/esmtp-detect.yaml by md 2023-03-29 15:21:25 -04:00
MostInterestingBotInTheWorld 400886032e Enhancement: network/detection/dotnet-remoting-service-detect.yaml by md 2023-03-29 15:15:20 -04:00
Notealot 4d524fd178
Update CVE-2011-2523.yaml (#6975) 2023-03-28 16:52:10 +05:30
MostInterestingBotInTheWorld 186745475b
dos2unix conversions (#6969)
* Add description and enhance one where the UI failed to save properly.
dos2unix on a template

* Change cvedetails link to nvd

* make severities match

* Enhancement: cves/2015/CVE-2015-2863.yaml by md

* Enhancement: cves/2017/CVE-2017-14524.yaml by md

* Enhancement: cves/2017/CVE-2017-5638.yaml by md

* Enhancement: cves/2019/CVE-2019-16759.yaml by md

* Enhancement: cves/2021/CVE-2021-22986.yaml by md

* Enhancement: cves/2021/CVE-2021-24145.yaml by md

* Enhancement: cves/2021/CVE-2021-24145.yaml by md

* Enhancement: cves/2021/CVE-2021-24155.yaml by md

* Enhancement: cves/2021/CVE-2021-24145.yaml by md

* Enhancement: cves/2021/CVE-2021-24145.yaml by md

* Enhancement: cves/2021/CVE-2021-24347.yaml by md

* Enhancement: cves/2021/CVE-2021-25003.yaml by md

* Enhancement: cves/2021/CVE-2021-25296.yaml by md

* Enhancement: cves/2021/CVE-2021-25297.yaml by md

* Enhancement: cves/2021/CVE-2021-25296.yaml by md

* Enhancement: cves/2021/CVE-2021-25297.yaml by md

* Enhancement: cves/2021/CVE-2021-25298.yaml by md

* Enhancement: cves/2021/CVE-2021-25297.yaml by md

* Enhancement: cves/2021/CVE-2021-28151.yaml by md

* Enhancement: cves/2021/CVE-2021-30128.yaml by md

* Enhancement: cves/2022/CVE-2022-0824.yaml by md

* Enhancement: cves/2022/CVE-2022-0824.yaml by md

* Enhancement: cves/2022/CVE-2022-0885.yaml by md

* Enhancement: cves/2022/CVE-2022-21587.yaml by md

* Enhancement: cves/2022/CVE-2022-2314.yaml by md

* Enhancement: cves/2022/CVE-2022-24816.yaml by md

* Enhancement: cves/2022/CVE-2022-31499.yaml by md

* Enhancement: cves/2022/CVE-2022-21587.yaml by md

* Enhancement: cves/2021/CVE-2021-24155.yaml by md

* Enhancement: cves/2017/CVE-2017-5638.yaml by md

* Enhancement: cves/2015/CVE-2015-2863.yaml by md

* Enhancement: cves/2022/CVE-2022-33901.yaml by md

* Enhancement: cves/2022/CVE-2022-2314.yaml by md

* Enhancement: cves/2022/CVE-2022-33901.yaml by md

* Enhancement: cves/2022/CVE-2022-34753.yaml by md

* Enhancement: cves/2022/CVE-2022-39952.yaml by md

* Enhancement: cves/2022/CVE-2022-4060.yaml by md

* Enhancement: cves/2022/CVE-2022-44877.yaml by md

* Enhancement: cves/2023/CVE-2023-0669.yaml by md

* Enhancement: cves/2023/CVE-2023-26255.yaml by md

* Enhancement: cves/2023/CVE-2023-26256.yaml by md

* Enhancement: exposures/files/salesforce-credentials.yaml by md

* Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md

* Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md

* Enhancement: network/backdoor/backdoored-zte.yaml by md

* Enhancement: network/detection/ibm-d2b-database-server.yaml by md

* Enhancement: network/detection/ibm-d2b-database-server.yaml by md

* Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md

* Enhancement: token-spray/api-abuseipdb.yaml by md

* Enhancement: token-spray/api-abuseipdb.yaml by md

* Enhancement: token-spray/api-dbt.yaml by md

* Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md

* Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md

* Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md

* Enhancement: vulnerabilities/froxlor-xss.yaml by md

* Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md

* Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md

* Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md

* Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md

* Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md

* Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md

* Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md

* Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md

* Enhancement: vulnerabilities/other/graylog-log4j.yaml by md

* Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md

* Initial cleanups for syntax errors

* dashboard gremlins

* Add log4j back to name

* Enhancement: exposures/files/salesforce-credentials.yaml by cs

* Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs

* Enhancement: network/backdoor/backdoored-zte.yaml by cs

* Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs

* Sev and other info tweaks

* Merge conflict

* Run dos2unix against all templates

* too many newlines error

* Fix too many blank lines error

* Fix severity mismatches
Cleanup language on a new test

---------

Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 14:22:40 -04:00
sullo 96d0b8f950 Run dos2unix against all templates 2023-03-27 13:56:52 -04:00
MostInterestingBotInTheWorld 301fddaeb0
Dashboard Content Enhancements (#6965)
* Add description and enhance one where the UI failed to save properly.
dos2unix on a template

* Change cvedetails link to nvd

* make severities match

* Enhancement: cves/2015/CVE-2015-2863.yaml by md

* Enhancement: cves/2017/CVE-2017-14524.yaml by md

* Enhancement: cves/2017/CVE-2017-5638.yaml by md

* Enhancement: cves/2019/CVE-2019-16759.yaml by md

* Enhancement: cves/2021/CVE-2021-22986.yaml by md

* Enhancement: cves/2021/CVE-2021-24145.yaml by md

* Enhancement: cves/2021/CVE-2021-24145.yaml by md

* Enhancement: cves/2021/CVE-2021-24155.yaml by md

* Enhancement: cves/2021/CVE-2021-24145.yaml by md

* Enhancement: cves/2021/CVE-2021-24145.yaml by md

* Enhancement: cves/2021/CVE-2021-24347.yaml by md

* Enhancement: cves/2021/CVE-2021-25003.yaml by md

* Enhancement: cves/2021/CVE-2021-25296.yaml by md

* Enhancement: cves/2021/CVE-2021-25297.yaml by md

* Enhancement: cves/2021/CVE-2021-25296.yaml by md

* Enhancement: cves/2021/CVE-2021-25297.yaml by md

* Enhancement: cves/2021/CVE-2021-25298.yaml by md

* Enhancement: cves/2021/CVE-2021-25297.yaml by md

* Enhancement: cves/2021/CVE-2021-28151.yaml by md

* Enhancement: cves/2021/CVE-2021-30128.yaml by md

* Enhancement: cves/2022/CVE-2022-0824.yaml by md

* Enhancement: cves/2022/CVE-2022-0824.yaml by md

* Enhancement: cves/2022/CVE-2022-0885.yaml by md

* Enhancement: cves/2022/CVE-2022-21587.yaml by md

* Enhancement: cves/2022/CVE-2022-2314.yaml by md

* Enhancement: cves/2022/CVE-2022-24816.yaml by md

* Enhancement: cves/2022/CVE-2022-31499.yaml by md

* Enhancement: cves/2022/CVE-2022-21587.yaml by md

* Enhancement: cves/2021/CVE-2021-24155.yaml by md

* Enhancement: cves/2017/CVE-2017-5638.yaml by md

* Enhancement: cves/2015/CVE-2015-2863.yaml by md

* Enhancement: cves/2022/CVE-2022-33901.yaml by md

* Enhancement: cves/2022/CVE-2022-2314.yaml by md

* Enhancement: cves/2022/CVE-2022-33901.yaml by md

* Enhancement: cves/2022/CVE-2022-34753.yaml by md

* Enhancement: cves/2022/CVE-2022-39952.yaml by md

* Enhancement: cves/2022/CVE-2022-4060.yaml by md

* Enhancement: cves/2022/CVE-2022-44877.yaml by md

* Enhancement: cves/2023/CVE-2023-0669.yaml by md

* Enhancement: cves/2023/CVE-2023-26255.yaml by md

* Enhancement: cves/2023/CVE-2023-26256.yaml by md

* Enhancement: exposures/files/salesforce-credentials.yaml by md

* Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md

* Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md

* Enhancement: network/backdoor/backdoored-zte.yaml by md

* Enhancement: network/detection/ibm-d2b-database-server.yaml by md

* Enhancement: network/detection/ibm-d2b-database-server.yaml by md

* Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md

* Enhancement: token-spray/api-abuseipdb.yaml by md

* Enhancement: token-spray/api-abuseipdb.yaml by md

* Enhancement: token-spray/api-dbt.yaml by md

* Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md

* Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md

* Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md

* Enhancement: vulnerabilities/froxlor-xss.yaml by md

* Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md

* Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md

* Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md

* Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md

* Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md

* Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md

* Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md

* Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md

* Enhancement: vulnerabilities/other/graylog-log4j.yaml by md

* Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md

* Initial cleanups for syntax errors

* dashboard gremlins

* Add log4j back to name

* Enhancement: exposures/files/salesforce-credentials.yaml by cs

* Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs

* Enhancement: network/backdoor/backdoored-zte.yaml by cs

* Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs

* Sev and other info tweaks

* Merge conflict

---------

Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 23:16:47 +05:30
MostInterestingBotInTheWorld 6df60bcdbc Enhancement: network/backdoor/backdoored-zte.yaml by cs 2023-03-27 10:21:11 -04:00
Dhiyaneshwaran d5735af67c
rename template 2023-03-25 21:58:41 +05:30
pussycat0x 454e78ba85
indentation -fix 2023-03-24 22:01:02 +05:30
pussycat0x f5dad6ef56
Erlang Port Mapper Daemon 2023-03-24 21:58:12 +05:30
MostInterestingBotInTheWorld 061159686a Enhancement: network/detection/ibm-d2b-database-server.yaml by md 2023-03-22 14:32:23 -04:00
MostInterestingBotInTheWorld 56ffd6e01a Enhancement: network/backdoor/backdoored-zte.yaml by md 2023-03-22 14:28:53 -04:00
sullo d69d4c45ca Add description and enhance one where the UI failed to save properly.
dos2unix on a template
2023-03-17 15:01:01 -04:00
MostInterestingBotInTheWorld 7677e07dec
Merge branch 'main' into dashboard 2023-03-17 11:24:28 -04:00
Ritik Chaddha 2b5c3c48cc
Merge pull request #6823 from sullo/severity-matching
Match severity with CVSS
2023-03-15 20:48:33 +05:30
MostInterestingBotInTheWorld b5383637ac Enhancement: network/detection/pgsql-detect.yaml by md 2023-03-15 11:07:42 -04:00